tomb

the crypto undertaker
git clone git://parazyd.org/tomb.git
Log | Files | Refs | README | LICENSE

commit 0d485bf51d6053d6be9566ef39bb1675b279220b
parent 4d82b20199c7037c1a1ab705790b19a845faa377
Author: Jaromil <jaromil@dyne.org>
Date:   Fri, 21 Nov 2014 22:50:45 +0100

Documentation for -k cleartext and --unsafe

Diffstat:
MREADME.md | 29+++++++++++++++--------------
Mdoc/tomb.1 | 6+++---
2 files changed, 18 insertions(+), 17 deletions(-)

diff --git a/README.md b/README.md @@ -208,25 +208,26 @@ Information on developers involved is found in the [AUTHORS](AUTHORS.md) file. Sure as Hell it can! Licensing issues aside ([GNU GPLv3+](COPYING) terms) Tomb provides machine-readable output and interaction via some flags: - flag | function --------------------- | ------------------------------------------------ - --no-color | avoids coloring output to allow parsing - --unsecure-dev-mode | allows giving passwords as argument - --tomb-pwd | specify the key password as argument - --tomb-old-pwd | specify the old key password as argument - --sudo-pwd | specify the sudo password as argument - -Yet please consider that these flags may introduce vulnerabilities as -process table scanning can reveal passwords while such commands are -executing. For passwords in particular the best is always let Tomb -gather them via pinentry. + flag | function +--------------- | ------------------------------------------------ + --no-color | avoids coloring output to allow parsing + --unsafe | allows passwords options and cleartext key from stdin + --tomb-pwd | specify the key password as argument + --tomb-old-pwd | specify the old key password as argument + --sudo-pwd | specify the sudo password as argument + -k cleartext | reads the unencrypted key from stdin + +Yet please consider that these flags may introduce vulnerabilities and +other people logged on the same system can easily log your passwords +while such commands are executing. We only recommend using the +pinentry input for your passwords. ## Python ![](extras/images/python_for_tomb.png) -A Python wrapper is under developed and already usable, but it -introduces the vulnerabilities mentioned above. Find it in +A Python wrapper is under development and already usable, but it +introduces some vulnerabilities mentioned above. Find it in `extras/tomber`. For more information see [PYTHON](extras/PYTHON.md). ## Graphical applications diff --git a/doc/tomb.1 b/doc/tomb.1 @@ -216,7 +216,7 @@ Print more information while running, for debugging purposes Suppress colors in console output (needed for string parsing by wrappers). .B -.IP "--unsecure-dev-mode" +.IP "--unsafe" Enable using dev-mode arguments, i.e. to pass passwords from commandline options. This is mostly used needed for execution by wrappers and testing suite. @@ -345,11 +345,11 @@ local copy of it: .EE .IP \(bu -Open a Tomb on a remote server using the local key on stdin to SSH, +Open a Tomb on a remote server passing the unencrypted local key on stdin via SSH, without saving any remote copy of it: .EX - cat .secrets/tomb.key | ssh server tomb open secret.tomb -k - + gpg -d .secrets/tomb.key | ssh server tomb open secret.tomb -k cleartext --unsafe .EE .IP \(bu